|
7 | 7 | from configuration import (
|
8 | 8 | available_ports,
|
9 | 9 | ALL_TEST_CURVES,
|
10 |
| - ALL_TEST_CERTS, |
| 10 | + MINIMAL_TEST_CERTS, |
11 | 11 | TLS13_CIPHERS,
|
12 | 12 | )
|
13 | 13 | from common import ProviderOptions, Protocols, Curves, data_bytes
|
@@ -156,7 +156,7 @@ def test_nothing():
|
156 | 156 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
157 | 157 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
158 | 158 | @pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
|
159 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 159 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
160 | 160 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
161 | 161 | @pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
|
162 | 162 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -224,7 +224,7 @@ def test_s2n_server_with_early_data(
|
224 | 224 |
|
225 | 225 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
226 | 226 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
227 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 227 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
228 | 228 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
229 | 229 | @pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
|
230 | 230 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -292,7 +292,7 @@ def test_s2n_client_with_early_data(
|
292 | 292 |
|
293 | 293 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
294 | 294 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
295 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 295 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
296 | 296 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
297 | 297 | @pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
|
298 | 298 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -360,7 +360,7 @@ def test_s2n_client_without_early_data(
|
360 | 360 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
361 | 361 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
362 | 362 | @pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
|
363 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 363 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
364 | 364 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
365 | 365 | @pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
|
366 | 366 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -431,7 +431,7 @@ def test_s2n_server_with_early_data_rejected(
|
431 | 431 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
432 | 432 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
433 | 433 | @pytest.mark.parametrize("curve", S2N_HRR_CURVES, ids=get_parameter_name)
|
434 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 434 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
435 | 435 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
436 | 436 | @pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
|
437 | 437 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -508,7 +508,7 @@ def test_s2n_client_with_early_data_rejected_via_hrr(
|
508 | 508 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
509 | 509 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
510 | 510 | @pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
|
511 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 511 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
512 | 512 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
513 | 513 | @pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
|
514 | 514 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
@@ -576,7 +576,7 @@ def test_s2n_server_with_early_data_rejected_via_hrr(
|
576 | 576 | @pytest.mark.uncollect_if(func=invalid_test_parameters)
|
577 | 577 | @pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
|
578 | 578 | @pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
|
579 |
| -@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) |
| 579 | +@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) |
580 | 580 | @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
|
581 | 581 | @pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
|
582 | 582 | @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
|
|
0 commit comments